Aylin Yener

Orcid: 0000-0003-0820-3390

Affiliations:
  • Penn State, University Park, USA


According to our database1, Aylin Yener authored at least 340 papers between 1999 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2015, "For contributions to wireless communication theory and wireless information security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Low-latency Secure Integrated Sensing and Communication with Transmitter Actions.
IACR Cryptol. ePrint Arch., 2024

Transmitter Actions for Secure Integrated Sensing and Communication.
IACR Cryptol. ePrint Arch., 2024

Secure Integrated Sensing and Communication under Correlated Rayleigh Fading.
IACR Cryptol. ePrint Arch., 2024

Next Generation Advanced Transceiver Technologies for 6G.
CoRR, 2024

Classification-Oriented Semantic Wireless Communications.
CoRR, 2024

Personalized Over-the-Air Federated Learning with Personalized Reconfigurable Intelligent Surfaces.
CoRR, 2024

Will 6G be Semantic Communications? Opportunities and Challenges from Task Oriented and Secure Communications to Integrated Sensing.
CoRR, 2024

Semantic Forwarding for Next Generation Relay Networks.
Proceedings of the 58th Annual Conference on Information Sciences and Systems, 2024

2023
Is Semantic Communication Secure? A Tale of Multi-Domain Adversarial Attacks.
IEEE Commun. Mag., November, 2023

Task-Oriented Communications for NextG: End-to-end Deep Learning and AI Security Aspects.
IEEE Wirel. Commun., June, 2023

Secure Integrated Sensing and Communication.
IEEE J. Sel. Areas Inf. Theory, 2023

Guest Editorial Special Issue on the Role of Freshness and Semantic Measures in the Transmission of Information for Next-Generation Networks.
IEEE J. Sel. Areas Inf. Theory, 2023

Beyond Transmitting Bits: Context, Semantics, and Task-Oriented Communications.
IEEE J. Sel. Areas Commun., 2023

Guest Editorial Special Issue on Beyond Transmitting Bits: Context, Semantics, and Task-Oriented Communications.
IEEE J. Sel. Areas Commun., 2023

Joint Sensing and Task-Oriented Communications with Image and Wireless Data Modalities for Dynamic Spectrum Access.
CoRR, 2023

Joint Sensing and Semantic Communications with Multi-Task Deep Learning.
CoRR, 2023

Multi-Receiver Task-Oriented Communications via Multi-Task Deep Learning.
CoRR, 2023

Secure Integrated Sensing and Communication for Binary Input Additive White Gaussian Noise Channels.
Proceedings of the 3rd IEEE International Symposium on Joint Communications & Sensing, 2023

Age of Information in Deep Learning-Driven Task-Oriented Communications.
Proceedings of the IEEE INFOCOM 2023, 2023

RIS-Assisted Over-the-Air Adaptive Federated Learning with Noisy Downlink.
Proceedings of the IEEE International Conference on Communications, 2023

ROAR-Fed: RIS-Assisted Over-the-Air Adaptive Resource Allocation for Federated Learning.
Proceedings of the IEEE International Conference on Communications, 2023

Semantic Text Compression for Classification.
Proceedings of the IEEE International Conference on Communications, 2023

Vulnerabilities of Deep Learning-Driven Semantic Communications to Backdoor (Trojan) Attacks.
Proceedings of the 57th Annual Conference on Information Sciences and Systems, 2023

Privacy-Preserving Clustered Peer-to-Peer Learning.
Proceedings of the 57th Asilomar Conference on Signals, Systems, and Computers, ACSSC 2023, Pacific Grove, CA, USA, October 29, 2023

2022
Valet attack on privacy: a cybersecurity threat in automotive Bluetooth infotainment systems.
Cybersecur., December, 2022

Learning to Transmit Fresh Information in Energy Harvesting Networks.
IEEE Trans. Green Commun. Netw., 2022

Secure Joint Communication and Sensing.
IACR Cryptol. ePrint Arch., 2022

Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper.
Entropy, 2022

Is Semantic Communications Secure? A Tale of Multi-Domain Adversarial Attacks.
CoRR, 2022

CHARLES: Channel-Quality-Adaptive Over-the-Air Federated Learning over Wireless Networks.
Proceedings of the 23rd IEEE International Workshop on Signal Processing Advances in Wireless Communication, 2022

Peak Age of Information with Receiver Induced Service Interruptions.
Proceedings of the IEEE Military Communications Conference, 2022

DiPLe: Learning Directed Collaboration Graphs for Peer-to-Peer Personalized Learning.
Proceedings of the IEEE Information Theory Workshop, 2022

Over-the-Air Federated Learning with Joint Adaptive Computation and Power Control.
Proceedings of the IEEE International Symposium on Information Theory, 2022

State Amplification and Masking While Timely Updating.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Proportional Fair Clustered Federated Learning.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Iterative Power Control for Wireless Networks with Distributed Reconfigurable Intelligent Surfaces.
Proceedings of the IEEE Global Communications Conference, 2022


Semantic Communications: A Paradigm Whose Time Has Come.
Proceedings of the 8th IEEE International Conference on Collaboration and Internet Computing, 2022

2021
Universal Covertness for Discrete Memoryless Sources.
IEEE Trans. Inf. Theory, 2021

Editorial.
IEEE J. Sel. Areas Inf. Theory, 2021

Coded Caching in the Presence of a Wire and a Cache Tapping Adversary of Type II.
IEEE J. Sel. Areas Inf. Theory, 2021

Benefits of Edge Caching With Coded Placement for Asymmetric Networks and Shared Caches.
IEEE J. Sel. Areas Inf. Theory, 2021

An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications.
IEEE J. Sel. Areas Inf. Theory, 2021

Sustainable Federated Learning.
CoRR, 2021

A Framework for Sustainable Federated Learning.
Proceedings of the 19th International Symposium on Modeling and Optimization in Mobile, 2021

Secure Communication in a Multi-antenna Wiretap Channel with a Reconfigurable Intelligent Surface.
Proceedings of the 17th International Symposium on Wireless Communication Systems, 2021

Energy-Harvesting Distributed Machine Learning.
Proceedings of the IEEE International Symposium on Information Theory, 2021

On the Timeliness of Arithmetic Coding.
Proceedings of the IEEE International Symposium on Information Theory, 2021

An Actor-Critic Reinforcement Learning Approach to Minimum age of Information Scheduling in Energy Harvesting Networks.
Proceedings of the IEEE International Conference on Acoustics, 2021

Autoencoder-based Communications with Reconfigurable Intelligent Surfaces.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2021

Learning to Transmit Fresh Information in Energy Harvesting Networks Using Supervised Learning.
Proceedings of the 55th Asilomar Conference on Signals, Systems, and Computers, 2021

2020
Learning an Adversary's Actions for Secret Communication.
IEEE Trans. Inf. Theory, 2020

Strongly Secure Multiuser Communication and Authentication With Anonymity Constraints.
IEEE Trans. Inf. Theory, 2020

Device-to-Device Secure Coded Caching.
IEEE Trans. Inf. Forensics Secur., 2020

Device-to-Device Coded-Caching With Distinct Cache Sizes.
IEEE Trans. Commun., 2020

Stochastic D2D Caching with Energy Harvesting Nodes.
Proceedings of the 18th International Symposium on Modeling and Optimization in Mobile, 2020

Age of Information Minimization in Wireless Powered Stochastic Energy Harvesting Networks.
Proceedings of the 54th Annual Conference on Information Sciences and Systems, 2020

2019
Generalizing Multiple Access Wiretap and Wiretap II Channel Models: Achievable Rates and Cost of Strong Secrecy.
IEEE Trans. Inf. Theory, 2019

Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Save-and-Transmit and Best-Effort.
IEEE Trans. Inf. Theory, 2019

Secret-Key Generation in Many-to-One Networks: An Integrated Game-Theoretic and Information-Theoretic Approach.
IEEE Trans. Inf. Theory, 2019

Benefits of Cache Assignment on Degraded Broadcast Channels.
IEEE Trans. Inf. Theory, 2019

Relay-Centric Two-Hop Networks With Asymmetric Wireless Energy Transfer: Stackelberg Games.
IEEE Trans. Green Commun. Netw., 2019

Coded Caching for Heterogeneous Systems: An Optimization Perspective.
IEEE Trans. Commun., 2019

Age of Information Minimization for an Energy Harvesting Cognitive Radio.
IEEE Trans. Cogn. Commun. Netw., 2019

Minimizing Age of Information for an Energy Harvesting Cognitive Radio.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Cache-Aided Combination Networks with Asymmetric End Users.
Proceedings of the 20th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2019

QoS and Jamming-Aware Wireless Networking Using Deep Reinforcement Learning.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Age of Information for Wireless Energy Harvesting Secondary Users in Cognitive Radio Networks.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2019

Secure Caching and Delivery for Combination Networks with Asymmetric Connectivity.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

Untrusted Caches in Two-layer Networks.
Proceedings of the IEEE International Symposium on Information Theory, 2019

In-Band Sensing of the Adversary's Channel for Secure Communication in Wireless Channels.
Proceedings of the IEEE International Symposium on Information Theory, 2019

The Degraded Gaussian Many-Access Wiretap Channel.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Impact of Imperfect Spectrum Sensing on Age of Information in Energy Harvesting Cognitive Radios.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Coded Placement for Systems with Shared Caches.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Age of Information Minimization for Wireless Ad Hoc Networks: A Deep Reinforcement Learning Approach.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

An Optimization Framework for Secure Delivery in Heterogeneous Coded Caching Systems.
Proceedings of the 53rd Asilomar Conference on Signals, Systems, and Computers, 2019

2018
Influence Propagation in Social Networks with Positive and Negative Relationships.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

A New Wiretap Channel Model and Its Strong Secrecy Capacity.
IEEE Trans. Inf. Theory, 2018

Subset Source Coding.
IEEE Trans. Inf. Theory, 2018

Lossy Coding of Correlated Sources Over a Multiple Access Channel: Necessary Conditions and Separation Results.
IEEE Trans. Inf. Theory, 2018

Polar Coding for the Multiple Access Wiretap Channel via Rate-Splitting and Cooperative Jamming.
IEEE Trans. Inf. Theory, 2018

The Semantic Communication Game.
IEEE Trans. Cogn. Commun. Netw., 2018

Combination Networks With or Without Secrecy Constraints: The Impact of Caching Relays.
IEEE J. Sel. Areas Commun., 2018

Sending Information Through Status Updates.
CoRR, 2018

A multi-leader stackelberg game for two-hop systems with wireless energy transfer.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

The Caching Broadcast Channel with a Wire and Cache Tapping Adversary of Type II.
Proceedings of the IEEE Information Theory Workshop, 2018

On Coded Caching with Heterogeneous Distortion Requirements.
Proceedings of the 2018 Information Theory and Applications Workshop, 2018

The Wiretap Channel with a Cache.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Sening Information Through Status Updates.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Relay-Centric Two-Hop Networks with Asymmetric Wireless Energy Transfer: A Multi-Leader-Follower Stackelberg Game.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Device-to-Device Coded Caching with Heterogeneous Cache Sizes.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Cache-aided combination networks with secrecy guarantees.
Proceedings of the 52nd Annual Conference on Information Sciences and Systems, 2018

The Caching Broadcast Channel with a Wire and Cache Tapping Adversary of Type II: Multiple Library Files.
Proceedings of the 56th Annual Allerton Conference on Communication, 2018

Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes.
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018

2017
The Binary Energy Harvesting Channel With a Unit-Sized Battery.
IEEE Trans. Inf. Theory, 2017

Secure Degrees of Freedom for the MIMO Wire-Tap Channel With a Multi-Antenna Cooperative Jammer.
IEEE Trans. Inf. Theory, 2017

Multi-Terminal Two-Hop Untrusted-Relay Networks With Hierarchical Security Guarantees.
IEEE Trans. Inf. Forensics Secur., 2017

Matching Games for Ad Hoc Networks with Wireless Energy Transfer.
IEEE Trans. Green Commun. Netw., 2017

Two-Party Zero-Error Function Computation with Asymmetric Priors.
Entropy, 2017

Online Transmission Policies for Cognitive Radio Networks with Energy Harvesting Secondary Users.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference Workshops, 2017

Centralized Coded Caching with Heterogeneous Cache Sizes.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Coded caching for combination networks with cache-aided relays.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Age-optimal constrained cache updating.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Learning adversary's actions for secret communication.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

A new broadcast wiretap channel model.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

New models for interference and broadcast channels with confidential messages.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

On the necessary conditions for transmitting correlated sources over a multiple access channel.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

The Gaussian multiple access wiretap channel when the eavesdropper can arbitrarily jam.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

The degraded Gaussian multiple access wiretap channel with selfish transmitters: A coalitional game theory perspective.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

A game theoretic treatment for pair-wise secret-key generation in many-to-one networks.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

StoryLine: Unsupervised Geo-event Demultiplexing in Social Spaces without Location Information.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017

Optimization of heterogeneous caching systems with rate limited links.
Proceedings of the IEEE International Conference on Communications, 2017

Gaussian broadcast channels with receiver cache assignment.
Proceedings of the IEEE International Conference on Communications, 2017

Energy Cooperative Multiple Access Channels with Energy Harvesting Transmitters and Receiver.
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017

State-adaptive coded caching for symmetric broadcast channels.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017

Resource Allocation in Body Area Networks for Energy Harvesting Healthcare Monitoring.
Proceedings of the Handbook of Large-Scale Distributed Computing in Smart Healthcare, 2017

2016
Delay Constrained Energy Harvesting Networks with Limited Energy and Data Storage.
IEEE J. Sel. Areas Commun., 2016

Green Distributed Storage Using Energy Harvesting Nodes.
IEEE J. Sel. Areas Commun., 2016

Lossy Transmission of Correlated Sources over a Multiple Access Channel: Necessary Conditions and Separation Results.
CoRR, 2016

Matching games for wireless networks with energy cooperation.
Proceedings of the 14th International Symposium on Modeling and Optimization in Mobile, 2016

A new multiple access wiretap channel model.
Proceedings of the 2016 IEEE Information Theory Workshop, 2016

Lossy subset source coding.
Proceedings of the 2016 Information Theory and Applications Workshop, 2016

The multiple access wiretap channel II with a noisy main channel.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Two-way lossy compression via a relay with self source.
Proceedings of the IEEE International Symposium on Information Theory, 2016

On lossy transmission of correlated sources over a multiple access channel.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Multiuser authentication with anonymity constraints over noisy channels.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Recursive Ground Truth Estimator for Social Data Streams.
Proceedings of the 15th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2016

On Source Dependency Models for Reliable Social Sensing: Algorithms and Fundamental Error Bounds.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Two-Hop Untrusted Relay Channel with an External Eavesdropper under Layered Secrecy Constraints.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Learning causal information flow structures in multi-layer networks.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

Interactive Function Compression with Asymmetric Priors.
Proceedings of the 2016 Data Compression Conference, 2016

Coded caching for resolvable networks with security requirements.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Fundamental limits of secure device-to-device coded caching.
Proceedings of the 50th Asilomar Conference on Signals, Systems and Computers, 2016

2015
Relaying for Multiuser Networks in the Absence of Codebook Information.
IEEE Trans. Inf. Theory, 2015

Energy Harvesting Networks With Energy Cooperation: Procrastinating Policies.
IEEE Trans. Commun., 2015

Throughput Maximization for Two-Way Relay Channels With Energy Harvesting Nodes: The Impact of Relaying Strategies.
IEEE Trans. Commun., 2015

Wireless Physical-Layer Security: Lessons Learned From Information Theory.
Proc. IEEE, 2015

Using Social Sensors for Influence Propagation in Networks With Positive and Negative Relationships.
IEEE J. Sel. Top. Signal Process., 2015

Incentivizing Signal and Energy Cooperation in Wireless Networks.
IEEE J. Sel. Areas Commun., 2015

Energy Harvesting Wireless Communications: A Review of Recent Advances.
IEEE J. Sel. Areas Commun., 2015

Guest Editorial: Wireless Communications Powered by Energy Harvesting and Wireless Energy Transfer, Part II.
IEEE J. Sel. Areas Commun., 2015

Guest Editorial: Wireless Communications Powered by Energy Harvesting and Wireless Energy Transfer (Part I).
IEEE J. Sel. Areas Commun., 2015

Optimum Policies for an Energy Harvesting Transmitter Under Energy Storage Losses.
IEEE J. Sel. Areas Commun., 2015

The energy harvesting multi-way relay channel with intermittent data: the impact of buffer sizes.
EURASIP J. Wirel. Commun. Netw., 2015

Fundamental limits of energy harvesting communications.
IEEE Commun. Mag., 2015

Protocols for efficient inference communication.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

The two-hop interference untrusted-relay channel with confidential messages.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

New directions in information theoretic security: Benefits of bidirectional signaling.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Maximizing recommender's influence in a social network: An information theoretic perspective.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

The binary energy harvesting channel with on-off fading.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Wiretap channel II with a noisy main channel.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Remote source coding with two-sided information.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Secure degrees of freedom of N ×N ×M wiretap channel with a K-antenna cooperative jammer.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Auction Schemes for Energy and Signal Cooperation in Two-Hop Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Low-Latency Communications over Zero-Battery Energy Harvesting Channels.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Throughput maximizing games in the two-hop relay channel with energy cooperation.
Proceedings of the 49th Annual Conference on Information Sciences and Systems, 2015

Towards green distributed storage systems.
Proceedings of the 49th Asilomar Conference on Signals, Systems and Computers, 2015

2014
Uplink Interference Management for Coexisting MIMO Femtocell and Macrocell Networks: An Interference Alignment Approach.
IEEE Trans. Wirel. Commun., 2014

Degrees of Freedom for the MIMO Multi-Way Relay Channel.
IEEE Trans. Inf. Theory, 2014

MIMO Wiretap Channels With Unknown and Varying Eavesdropper Channel States.
IEEE Trans. Inf. Theory, 2014

Providing Secrecy With Structured Codes: Two-User Gaussian Channels.
IEEE Trans. Inf. Theory, 2014

MIMO Broadcast Channel with an Unknown Eavesdropper: Secrecy Degrees of Freedom.
IEEE Trans. Commun., 2014

Selective Interference Alignment for MIMO Cognitive Femtocell Networks.
IEEE J. Sel. Areas Commun., 2014

Operational information content sum capacity: From theory to practice.
Comput. Networks, 2014

Power minimization with quality-of-information outages.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Semantic index assignment.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

The multiple access channel with an untrusted relay.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

State amplification and state masking for the binary energy harvesting channel.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Capacity of the energy harvesting channel with energy arrival information at the receiver.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Secure degrees of freedom for the MIMO wiretap channel with a multiantenna cooperative jammer.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Energy harvesting communications with continuous energy arrivals.
Proceedings of the 2014 Information Theory and Applications Workshop, 2014

Improved capacity bounds for the binary energy harvesting channel.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Capacity of the discrete memoryless energy harvesting channel with side information.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Energy harvesting communications with energy and data storage limitations.
Proceedings of the IEEE Global Communications Conference, 2014

The energy harvesting and energy cooperating two-way channel with finite-sized batteries.
Proceedings of the IEEE Global Communications Conference, 2014

A study on compressing graphical structures.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

Communicating in a socially-aware network: Impact of relationship types.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

Compressing Semantic Information with Varying Priorities.
Proceedings of the Data Compression Conference, 2014

Optimal strategies for targeted influence in signed networks.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

Multi-terminal networks with an untrusted relay.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

Energy harvesting two-way communications with limited energy and data storage.
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014

2013
Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming.
IEEE Trans. Wirel. Commun., 2013

End-to-End Secure Multi-Hop Communication with Untrusted Relays.
IEEE Trans. Wirel. Commun., 2013

Guiding Blind Transmitters: Degrees of Freedom Optimal Interference Alignment Using Relays.
IEEE Trans. Inf. Theory, 2013

Degraded Broadcast Diamond Channels With Noncausal State Information at the Source.
IEEE Trans. Inf. Theory, 2013

Multiple Access Channels With States Causally Known at Transmitters.
IEEE Trans. Inf. Theory, 2013

The Role of Feedback in Two-Way Secure Communications.
IEEE Trans. Inf. Theory, 2013

Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay.
IEEE Trans. Inf. Theory, 2013

MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of Freedom.
IEEE Trans. Inf. Theory, 2013

The Multiway Relay Channel.
IEEE Trans. Inf. Theory, 2013

Cooperative Security at the Physical Layer: A Summary of Recent Advances.
IEEE Signal Process. Mag., 2013

Spectrum sensing in cognitive radio networks: Performance evaluation and optimization.
Phys. Commun., 2013

Maximizing Quality of Information From Multiple Sensor Devices: The Exploration vs Exploitation Tradeoff.
IEEE J. Sel. Top. Signal Process., 2013

Cooperative energy harvesting communications with relaying and energy sharing.
Proceedings of the 2013 IEEE Information Theory Workshop, 2013

Multiple access and two-way channels with energy harvesting and bi-directional energy cooperation.
Proceedings of the 2013 Information Theory and Applications Workshop, 2013

Binary energy harvesting channel with finite energy storage.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Energy harvesting two-way half-duplex relay channel with decode-and-forward relaying: Optimum power policies.
Proceedings of the 18th International Conference on Digital Signal Processing, 2013

Optimum transmission policies for energy harvesting two-way relay channels.
Proceedings of the IEEE International Conference on Communications, 2013

Degrees of freedom optimal transmission for the two-cluster MIMO multi-way relay channel.
Proceedings of IEEE International Conference on Communications, 2013

Relay selection for flexible multihop communication via competitive spectrum leasing.
Proceedings of IEEE International Conference on Communications, 2013

Selective interference alignment for MIMO femtocell networks.
Proceedings of IEEE International Conference on Communications, 2013

Two-hop networks with energy harvesting: The (non-)impact of buffer size.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

The energy harvesting two-way decode-and-forward relay channel with stochastic data arrivals.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

Degrees of freedom of the single antenna gaussian wiretap channel with a helper irrespective of the number of antennas at the eavesdropper.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

A study of semantic data compression.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

The state-dependent degraded broadcast diamond channel.
Proceedings of the Australian Communications Theory Workshop, AusCTW 2013, Adelaide, 2013

How many antennas does a cooperative jammer need for achieving the degrees of freedom of multiple antenna Gaussian channels in the presence of an eavesdropper?
Proceedings of the 51st Annual Allerton Conference on Communication, 2013

Multi-pair and multi-way communications using energy harvesting nodes.
Proceedings of the 2013 Asilomar Conference on Signals, 2013

2012
Optimum Transmission Policies for Battery Limited Energy Harvesting Nodes.
IEEE Trans. Wirel. Commun., 2012

Symmetric Capacity of the Gaussian Interference Channel With an Out-of-Band Relay to Within 1.15 Bits.
IEEE Trans. Inf. Theory, 2012

Sum-rate optimal power policies for energy harvesting transmitters in an interference channel.
J. Commun. Networks, 2012

Communicating Using an Energy Harvesting Transmitter: Optimum Policies Under Energy Storage Losses
CoRR, 2012

Degraded Broadcast Diamond Channels with Non-Causal State Information at the Source
CoRR, 2012

Relay-aided interference alignment for the X channel with limited CSI.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Relays can provide alignment for the K-user interference channel without channel state information at the transmitters.
Proceedings of the 13th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2012

Facilitating flexible multihop communication via spectrum leasing.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Maximizing credibility-based network utility via power allocation.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

The energy harvesting multiple access channel with energy storage losses.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

Communicating with energy harvesting transmitters and receivers.
Proceedings of the 2012 Information Theory and Applications Workshop, 2012

Guiding blind transmitters: Relay-aided interference alignment for the X channel.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

The Gaussian interference wiretap channel when the eavesdropper channel is arbitrarily varying.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Signal space alignment and degrees of freedom for the two-cluster multi-way relay channel.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

On schedulability and time composability of data aggregation networks.
Proceedings of the 15th International Conference on Information Fusion, 2012

Optimal power policy for energy harvesting transmitters with inefficient energy storage.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

The interference wiretap channel with an arbitrarily varying eavesdropper: Aligning interference with artificial noise.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

Energy harvesting broadcast channel with inefficient energy storage.
Proceedings of the Conference Record of the Forty Sixth Asilomar Conference on Signals, 2012

Session MA4b: Green radio (invited).
Proceedings of the Conference Record of the Forty Sixth Asilomar Conference on Signals, 2012

2011
Cost-Delay Tradeoffs for Two-Way Relay Networks.
IEEE Trans. Wirel. Commun., 2011

The Gaussian Interference Relay Channel: Improved Achievable Rates and Sum Rate Upperbounds Using a Potent Relay.
IEEE Trans. Inf. Theory, 2011

The Gaussian Many-to-One Interference Channel With Confidential Messages.
IEEE Trans. Inf. Theory, 2011

Guest Editorial Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems.
IEEE Trans. Inf. Forensics Secur., 2011

The Effect of Eavesdroppers on Network Connectivity: A Secrecy Graph Approach.
IEEE Trans. Inf. Forensics Secur., 2011

Transmission with Energy Harvesting Nodes in Fading Wireless Channels: Optimal Policies.
IEEE J. Sel. Areas Commun., 2011

Message and State Cooperation in a Relay Channel When Only the Relay Knows the State
CoRR, 2011

Quality of Information aware scheduling in task processing networks.
Proceedings of the 9th International Symposium on Modeling and Optimization in Mobile, 2011

Cooperative jamming via spectrum leasing.
Proceedings of the 9th International Symposium on Modeling and Optimization in Mobile, 2011

Quality-of-information aware networking for tactical military networks.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Distributed backpressure protocols with limited state feedback.
Proceedings of the MILCOM 2011, 2011

Quality-of-information aware transmission policies with time-varying links.
Proceedings of the MILCOM 2011, 2011

Message and state cooperation in a relay channel when the relay has strictly causal state information.
Proceedings of the Information Theory and Applications Workshop, 2011

Leveraging strictly causal state information at the encoders for multiple access channels.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Secrecy when the eavesdropper controls its channel states.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Resource management for fading wireless channels with energy harvesting nodes.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Short-Term Throughput Maximization for Battery Limited Energy Harvesting Nodes.
Proceedings of IEEE International Conference on Communications, 2011

Harnessing Interference with an Out-of-Band Relay: An Approximate Capacity Result.
Proceedings of IEEE International Conference on Communications, 2011

Gaussian two-way wiretap channel with an arbitrarily varying eavesdropper.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

MIMO Broadcast Channel with Arbitrarily Varying Eavesdropper Channel: Secrecy Degrees of Freedom.
Proceedings of the Global Communications Conference, 2011

Interference Alignment for Cooperative MIMO Femtocell Networks.
Proceedings of the Global Communications Conference, 2011

Real-time capacity of networked data fusion.
Proceedings of the 14th International Conference on Information Fusion, 2011

Operational information content sum capacity: Formulation and examples.
Proceedings of the 14th International Conference on Information Fusion, 2011

Adaptive transmission policies for energy harvesting wireless nodes in fading channels.
Proceedings of the 45st Annual Conference on Information Sciences and Systems, 2011

Transmission policies for asymmetric interference channels with energy harvesting nodes.
Proceedings of the 4th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing, 2011

Recruiting multi-antenna transmitters as cooperative jammers: An auction-theoretic approach.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

MIMO multiple access channel with an arbitrarily varying eavesdropper.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

Session WA4b: Multiuser information theory.
Proceedings of the Conference Record of the Forty Fifth Asilomar Conference on Signals, 2011

Optimal power control for energy harvesting transmitters in an interference channel.
Proceedings of the Conference Record of the Forty Fifth Asilomar Conference on Signals, 2011

Relaying for multiple sources in the absence of codebook information.
Proceedings of the Conference Record of the Forty Fifth Asilomar Conference on Signals, 2011

2010
Power allocation for F/TDMA multiuser two-way relay networks.
IEEE Trans. Wirel. Commun., 2010

Correction to: "the Gaussian multiple access wire-tap channel" and "the general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming".
IEEE Trans. Inf. Theory, 2010

Cooperation with an untrusted relay: a secrecy perspective.
IEEE Trans. Inf. Theory, 2010

Resource Allocation for the Multiband Relay Channel: A Building Block for Hybrid Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2010

MIMO Wiretap Channels with Arbitrarily Varying Eavesdropper Channel States
CoRR, 2010

The Gaussian Many-to-1 Interference Channel with Confidential Messages
CoRR, 2010

The role of channel states in secret key generation.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

Connectivity in wireless networks with dynamic key compromise and recovery.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

The ergodic fading interference channel with an on-and-off relay.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Modeling location uncertainty for eavesdroppers: A secrecy graph approach.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Improved Achievable Rates for the Gaussian Interference Relay Channel.
Proceedings of IEEE International Conference on Communications, 2010

A New Outer Bound for the Secrecy Capacity Region of the Gaussian Two-Way Wiretap Channel.
Proceedings of IEEE International Conference on Communications, 2010

Providing Secrecy Irrespective of Eavesdropper's Channel State.
Proceedings of the Global Communications Conference, 2010

On performance evaluation of cooperative spectrum sensing in cognitive radio networks.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010

Cost constrained spectrum sensing in cognitive radio networks.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010

Queue based compression in a two-way relay network.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010

Sum capacity of the deterministic interference channel with an out-of-band half-duplex relay.
Proceedings of the 48th Annual Allerton Conference on Communication, 2010

Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas.
Proceedings of the 48th Annual Allerton Conference on Communication, 2010

2009
Multiuser Two-Way Relaying: Detection and Interference Management Strategies.
IEEE Trans. Wirel. Commun., 2009

Two-Hop Secure Communication Using an Untrusted Relay.
EURASIP J. Wirel. Commun. Netw., 2009

Providing Secrecy With Structured Codes: Tools and Applications to Two-User Gaussian Channels
CoRR, 2009

K-user interference channels: Achievable secrecy rate and degrees of freedom.
Proceedings of the 2009 IEEE Information Theory Workshop, 2009

Secure communication with a Byzantine relay.
Proceedings of the IEEE International Symposium on Information Theory, 2009

The multi-way relay channel.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Power Allocation for Multi-Access Two-Way Relaying.
Proceedings of IEEE International Conference on Communications, 2009

The Gaussian Interference Relay Channel with a Potent Relay.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

The Cognitive Multiple Access Wire-Tap Channel.
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009

A new outer bound for the gaussian interference channel with confidential messages.
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009

Interference channels with strong secrecy.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

Cost sharing with network coding in two-way relay networks.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

2008
Distributed power allocation strategies for parallel relay networks.
IEEE Trans. Wirel. Commun., 2008

The Gaussian Multiple Access Wire-Tap Channel.
IEEE Trans. Inf. Theory, 2008

The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming.
IEEE Trans. Inf. Theory, 2008

Relay assisted F/TDMA ad hoc networks: node classification, power allocation and relaying strategies.
IEEE Trans. Commun., 2008

An efficient framed-slotted ALOHA algorithm with pilot frame and binary selection for anti-collision of RFID tags.
IEEE Commun. Lett., 2008

Rethinking information theory for mobile ad hoc networks.
IEEE Commun. Mag., 2008

Stability regions of two-way relaying with network coding.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

Stability of bi-directional cooperative relay networks.
Proceedings of the 2008 IEEE Information Theory Workshop, 2008

The role of an untrusted relay in secret communication.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Joint Power Scheduling and Estimator Design for Sensor Networks Across Parallel Channels.
Proceedings of IEEE International Conference on Communications, 2008

Multiuser Two-Way Relaying for Interference Limited Systems.
Proceedings of IEEE International Conference on Communications, 2008

Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

On the energy-delay trade-off of a two-way relay network.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008

Interference management for multiuser two-way relaying.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008

Providing secrecy with lattice codes.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

On the role of feedback in two-way secure communication.
Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers, 2008

End-to-end secure multi-hop communication with untrusted relays is possible.
Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers, 2008

2007
Downlink Throughput Maximization for Interference Limited Multiuser Systems: TDMA versus CDMA.
IEEE Trans. Wirel. Commun., 2007

Power-Controlled CDMA Cell Sectorization with Multiuser Detection: A Comprehensive Analysis on Uplink and Downlink.
EURASIP J. Wirel. Commun. Netw., 2007

ASAP: A MAC Protocol for Dense and Time-Constrained RFID Systems.
EURASIP J. Wirel. Commun. Netw., 2007

The General Gaussian Multiple Access and Two-Way Wire-Tap Channels: Achievable Rates and Cooperative Jamming
CoRR, 2007

The Gaussian multiple access wire-tap channel: wireless secrecy and cooperative jamming
CoRR, 2007

Achievable Rates for Two-Way Wire-Tap Channels.
Proceedings of the IEEE International Symposium on Information Theory, 2007

2006
MMSE transmitter design for correlated MIMO systems with imperfect channel estimates: power allocation trade-offs.
IEEE Trans. Wirel. Commun., 2006

MIMO-CDMA systems: signature and beamformer design with various levels of feedback.
IEEE Trans. Signal Process., 2006

On-demand diversity wireless relay networks.
Mob. Networks Appl., 2006

Achievable Rates for the General Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy
CoRR, 2006

Efficient Scheduling for Delay Constrained CDMA Wireless Sensor Networks.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006

The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Power Allocation and Hybrid Relaying Strategies for F/TDMA Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2006

OPT: Optimal Protocol Tree for Efficient Tag Identification in Dense RFID Systems.
Proceedings of IEEE International Conference on Communications, 2006

Outage Performance of Cognitive Wireless Relay Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Iterative Power Allocation Algorithms for Amplify/Estimate/Compress-and-Forward Multi-Band Relay Channels.
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006

2005
Transmission strategies for correlated MIMO links with imperfect channel estimates.
Proceedings of IEEE International Conference on Communications, 2005

Distributed power allocation for parallel relay networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Iterative transmitter and receiver optimization for CDMA networks.
IEEE Trans. Wirel. Commun., 2004

Rank constrained temporal-spatial matrix filters for CDMA systems.
IEEE Trans. Wirel. Commun., 2004

Transceiver optimization for multiuser MIMO systems.
IEEE Trans. Signal Process., 2004

Time-Slotted Multiuser MIMO Systems: Beamforming and Scheduling Strategies.
EURASIP J. Wirel. Commun. Netw., 2004

EDCF-DM: a novel enhanced distributed coordination function for wireless ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2004

Signature sequence selection for CDMA systems with multiple receiver antennas.
Proceedings of IEEE International Conference on Communications, 2004

2003
Rank constrained temporal-spatial filters for CDMA systems in multipath channels.
Proceedings of the Global Telecommunications Conference, 2003

2002
Combined multiuser detection and beamforming for CDMA systems: filter structures.
IEEE Trans. Veh. Technol., 2002

CDMA multiuser detection: a nonlinear programming approach.
IEEE Trans. Commun., 2002

Noncoherent Multiuser Communications: Multistage Detection and Selective Filtering.
EURASIP J. Adv. Signal Process., 2002

2001
Interference management for CDMA systems through power control, multiuser detection, and beamforming.
IEEE Trans. Commun., 2001

Adaptive cell sectorization for CDMA systems.
IEEE J. Sel. Areas Commun., 2001

Nonlinear Programming Based Detectors for Multiuser Systems.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

Improving soft interference cancellation for CDMA systems.
Proceedings of the IEEE International Conference on Communications, 2001

2000
Acquisition dependent random access for connectionless CDMA systems.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

1999
Capacity enhancement for CDMA systems through adaptive cell sectorization.
Proceedings of the 1999 IEEE Wireless Communications and Networking Conference, 1999


  Loading...